The Major Goals Of Cyber Terrorism

1181 Words 5 Pages
Cyber Terrorism refers to an unlawful act perpetrated by the use of computers and telecommunications capabilities, leading to violence, destruction of property and interference with services. The action creates fear by causing unrest and uncertainty within a given group of people. Such acts are often conducted with one primary goal to influence the government to be conventional to a particular political, social, and ideological agenda. This paper understands terrorism as an intentional act, done with the knowledge of information technology so as to incite terror in a country or a given population in a country. The major goal of cyber terrorism is to create large-scale destruction, murder, and even infringement of rights. There are three …show more content…
Cyber terrorism, in this case, involves sending of viral messages, presentations, magazines, and recorded videos developed by terrorist organizations and their sympathizers. Through the propaganda, violence is promoted hence affecting the audience. Internet propaganda also includes the use of video footage of violent acts of terrorists’ activities that simulates terrorist acts. Cyber terrorism involves the promotion of extremist rhetoric encouraging violent acts through networking platforms such as Facebook and Twitter. Terrorist propaganda poses a challenge of recruitment, radicalization, and incitement to terrorism. Terrorist propaganda may be used to manipulate individuals to undermine their belief in certain …show more content…
Healthcare institutions used to have self-centered caregivers with information kept in paper files. Information and telecommunication technologies have led to a shift in the method of keeping data from the paper files to online storage. The security and privacy of information stored in the cyberspace have been of a major concern to most managers due to the current increase in cyber activities that promote terrorism. In the healthcare, for instance, huge amounts of sensitive data are exchanged daily between public organizations’ networks. The interconnectivity of information systems is therefore increased, exposing a growing number of data to a variety of threats and vulnerabilities due to the increase in the cyber crimes. Organizations are therefore forced to develop methodologies that address the changes in information security and provide information assurance that is effective, consistent, and continuous. Security policies and guidelines will hence be useful in dealing with cyber terrorism, not only in the United State of America but the entire world. Organizations have come up with different ways of preventing and managing the terrorist threat, and risk assessment included. The risk assessment identifies threats and vulnerabilities, hence should be

Related Documents

Related Topics